Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- methods 3
- Economics 2
- Health and hygiene 2
- History 2
- Law 2
- Medicine 2
- Moral and ethical aspects 2
- Religious life 2
- Women 2
- Academic writing 1
- Administration 1
- Advertising 1
- Anesthesia 1
- Anesthesiology 1
- Application software 1
- Arthritis 1
- Arthritis, Rheumatoid 1
- Attitudes 1
- Big data 1
- Biochemical Phenomena 1
- Biochemistry 1
- Cave ecology 1
- Christian men 1
- Christian sociology 1
- Christian women 1
- Christianity 1
- Climate Change 1
- Clinical biochemistry 1
- Consumers 1
-
7221
Optimal Sizing of a Hybrid Renewable Photovoltaic-Wind System-Based Microgrid Using Harris Hawk Optimizer
Published 2022-01-01“…The efficacy of HHO is investigated, and its performance was compared with seven metaheuristic techniques, grasshopper optimization algorithm (GOA), cuckoo search optimizer (CSO), genetic algorithm (GA), Big Bang–Big Crunch (BBBC), coyote optimizer, crow search, and butterfly optimization algorithm (BOA), to attain the HRE microgrid optimal sizing based on annualized system cost (ASC) reduction. …”
Get full text
Article -
7222
An Enhanced Semisteady-State Jaya Algorithm With a Control Coefficient and a Self-Adaptive Multipopulation Strategy
Published 2025-01-01“…When compared with the Snow Geese Algorithm (SGA), Big Bang–Big Crunch Algorithm (BBBCA), firefly algorithm (FA), bat algorithm (BA), cuckoo search algorithm (CSA), and flower pollination algorithm (FPA), the ESJaya algorithm gives competitive results in terms of obtaining optimum values, mean accuracy, and stability. …”
Get full text
Article -
7223
-
7224
Trends in InsurTech Development in Korea: A News Media Analysis of Key Technologies, Players, and Solutions
Published 2025-01-01“…First, regarding changes in InsurTech technology, blockchain and the Internet of Things initially garnered significant attention, but artificial intelligence and big data later emerged as more critical technologies. …”
Get full text
Article -
7225
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01“…The construction of new critical infrastructure, represented by high-speed full-time signal coverage, intelligent and fine-grained urban management, and deep space and deep sea scientific innovation experimental fields, has entered a new stage with the deep integration and development of new technologies such as 5G/6G, artificial intelligence, and blockchain in various fields.The security evaluation of cryptography applications, as a key technological resource for ensuring the security of national information, integration, and innovation infrastructure, has risen to the level of international law and national development strategy.It is urgent to construct a comprehensive, fine-grained, and self-evolving cryptography security evaluation system throughout the data lifecycle.The typical APT attacks and ransomware attacks faced by new critical infrastructure in industries such as energy, medicine, and transportation in recent years were considered.And then the growing demand for security evaluation of cryptography applications was analyzed in the face of new business requirements such as preventing endogenous data security risks, achieving differentiated privacy protection, and supporting authenticated attack traceability.The new challenges were also examined, which were brought by new information infrastructure (including big data, 5G communication, fundamental software, etc.), integration infrastructure (including intelligent connected vehicles, intelligent connected industrial control systems, etc.), and innovation infrastructure (including big data, artificial intelligence, blockchain, etc.) to the security evaluation of cryptography applications.Furthermore, the new requirements were revealed about domestically produced cryptography algorithms and protocols deployed on high-performance computing chips, ultra-high-speed communication modules, and large-capacity storage media for cryptography application security evaluation technology.Finally, the development of automated and intelligent cryptography application security evaluation technology was explored.…”
Get full text
Article -
7226
ENHANCING ACCOUNTABILITY FOR MAKING CITIES RESILIENT AND ROLE OF SUPREME AUDIT INSTITUTIONS
Published 2017-06-01“…Asknown, the programs and projects related to making cities resilient are mostlylong- term and require big budgets. Implementing the long-term programs andprojects requiring a big budget financed by multi-stakeholders can be carriedout in a transparent manner. …”
Get full text
Article -
7227
New Media Marketing Strategy Optimization in the Catering Industry Based on Deep Machine Learning Algorithms
Published 2022-01-01“…The era of unreachable big data has arrived, which raises questions for the development of corporate marketing. …”
Get full text
Article -
7228
Study on the Relationship between Pore Structure and Uniaxial Compressive Strength of Cemented Paste Backfill by Using Air-Entraining Agent
Published 2021-01-01“…With the increase in AEA content, the total pore volume of different pore sizes in AEACPB increases, in which the proportion of big and medium pore gradually increases while the proportion of small pore gradually decreases. …”
Get full text
Article -
7229
Teacher’s Challenges towards Online Learning in Pandemic Era
Published 2020-12-01“… The teaching and learning process has a big revolution since Corona Virus Disease 19 (COVID19) has spread out to the world. …”
Get full text
Article -
7230
Road Traffic Safety Risk Estimation Method Based on Vehicle Onboard Diagnostic Data
Published 2020-01-01“…In this study, the correlations between high-incidence locations for aberrant driving behaviors and locations of road traffic accidents are analyzed based on vehicle OBD data. …”
Get full text
Article -
7231
Bridging the Maturity Gaps in Industrial Data Science: Navigating Challenges in IoT-Driven Manufacturing
Published 2025-01-01“…The importance of including stakeholders in the data review process to enhance the data quality is accentuated in this paper, specifically when big data analysis is to be integrated into corporate strategies. …”
Get full text
Article -
7232
Monte Carlo Algorithm For Matrices in Solving Systems of Linear Equations, Determinants, Inverse, Eigen Values, and Eigenvectors.
Published 2024“…This research provides me with a solid base of knowledge in numerical linear algebra for parallel high-performance computing systems. Future research should focus on enhancing sampling efficiency in matrix-vector products along MCGMRES iterations and implementing the RSVD algorithm on big data analysis platforms.…”
Get full text
Thesis -
7233
An Investigation of the Basic Physics of Irrigation in Urology and the Role of Automated Pump Irrigation in Cystoscopy
Published 2012-01-01“…In Experiment 1, saline bags were elevated to measure the increment in flow rate. …”
Get full text
Article -
7234
Cytokines in Pericardial Effusion of Patients with Inflammatory Pericardial Disease
Published 2012-01-01“…Conclusions. VEGF and bFGF levels in pericardial effusion are elevated in patients with inflammatory PE. …”
Get full text
Article -
7235
Fuzzy Logic-Based Arrival Time Estimation for Indoor Navigation Using Augmented Reality
Published 2025-01-01“…Algoritma ini mengambil pecutan telefon dalam arah x dan z sebagai input dan menggunakan fungsi keahlian berbentuk segi tiga bagi pemboleh ubah masuk dan keluar. Dapatan eksperimen menunjukkan kebolehan menggunakan logik kabur bagi menganggarkan masa ketibaan bagi navigasi dalaman, dengan kesilapan anggaran purata sebanyak 5.82%. …”
Get full text
Article -
7236
21ST INTERNATIONAL CONFERENCEON STATISTICAL SCIENCES
Published 2024-12-01“…The three-day conference, held from December 9 to 11, 2024, brought together renowned experts, researchers, and students worldwide to discuss the theme "Mobilizing Data Science & Big Data to Achieve SDGs." …”
Get full text
Article -
7237
Joseph Delteil à la recherche de l’Occitanie
Published 2021-11-01“…Joseph Delteil (1894-1978), a French-speaking writer from Aude, claims to have been born in Villar-en-Val (Aude) in the garrigue (more likely in a village bedroom), a few dozen kilometers from the Big Blue. At various times in his work, Delteil set out regular milestones for understanding the "Midi", whose different facets he explored in terms of both landscape and history.…”
Get full text
Article -
7238
La corrupción en España: rasgos y causas esenciales
Published 2016-01-01“…This kind of corruption is frequently highlighted by the media and linked to the economic problems of the country, mainly unemployment, creating a big problem of disaffection and distrust in our political institutions.…”
Get full text
Article -
7239
Le corpus de poésie dite « populaire » comme matériau de recherche pour les sciences humaines et sociales
Published 2016-06-01“…In some qacida-s are kept yet the contents of some important theological and cutural disputes and the marks of big political events.…”
Get full text
Article -
7240
QUIET REVOLUTION IN THE ORGANIZATION OF BRANCHES
Published 2016-05-01“…Economic and geopolitical crises have changed priorities in behavior of competitive firms and possession of a big share of today's market. It isn't the key to success in the future any more. …”
Get full text
Article